• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 1
  • 1
  • Tagged with
  • 8
  • 8
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Non-monotonic trust management for distributed systems

Dong, Changyu January 2009 (has links)
No description available.
2

Bezpečnost a důvěra v komponentovém modelu DEECo / Security and Trust in the DEECo Component Model

Štumpf, Ondřej January 2015 (has links)
DEECo represents an example of a Cyber-Physical System (CPS) consisting of potentially vast number of components able to share data with each other. So far, access to data was not restricted, thus enabling components to exploit sensitive data owned by other components. The goal of this work is to analyze security threats in distributed environments such as DEECo and propose a security solution which would provide both physical security of component data and introduce an access control mechanism. However, while confidentiality may be critical to certain applications, data integrity is crucial to almost every one. This work therefore also proposes a trust model, which prevents components operating with defective or malicious data. Both proposed models are realized in jDEECo, a Java implementation of DEECo.
3

Insecurity And Trust In Cyprus: Rethinking The Security Dilemma Within The Context Of The Cyprus Problem

Borman, Ipek 01 October 2012 (has links) (PDF)
This thesis rethinks the security dilemma within the context of the Cyprus problem. It analyzes and problematizes the established political discourses and societal insecurities in Cyprus. It basically contends that the Cyprus problem should be reconceptualized from a critical security perspective, utilizing the fatalist, mitigator and transcender logics of insecurity. In that regard, it advances the idea that the security paradox in Cyprus should be rethought with the aim of transcending it through reconciliation and trust-building. The thesis takes attention to the scope of human agency, both at the state and human society levels, in the processes of reconciliation and trust-building, and concludes that these processes are key in transforming the two communities in the island into a post-national and pluralistic community of Cyprus.
4

Routing And Security In Wireless Sensor Networks, An Experimental Evaluation Of A Proposed Trust Based Routing Protocol

Chalabianloo, Niaz 01 February 2013 (has links) (PDF)
Satisfactory results obtained from sensor networks and the ongoing development in electronics and wireless communications have led to an impressive boost in the number of applications based on WSNs. Along with the growth in popularity of WSNs, previously implemented solutions need further improvements and new challenges arise which need to be solved. One of the main concerns regarding WSNs is the existence of security threats against their routing operations. Likelihood of security attacks in a structure suffering from resource constraints makes it an important task to choose proper security mechanisms for the routing decisions in various types of WSN applications. The main purpose of this study is to survey WSNs, routing protocols, security attacks against routing layer of a WSN, introduction of Trust based models which are an effective defense mechanism against security attacks in WSNs and finally, to implement a proposed Trust based routing protocol in order to overcome security attacks. The study begins with a survey of Sensor Networks, after the introduction of WSNs and their related routing protocols, the issue of security attacks against the network layer of a Sensor Network is described with a presentation of different types of attacks and some of Trust based related works. In the final chapters of this research, a novel Trust based AODV protocol will be proposed, implemented and examined in a simulation environment. For this purpose, multiple number of scenarios will be simulated on the AODV protocol with and without Trust mechanism, then the achieved results will be compared to derive a conclusion.
5

Routing And Security In Wireless Sensor Networks, An Experimental Evaluation Of A Proposed Trust Based Routing Protocol

Chalabianloo, Niaz 01 February 2013 (has links) (PDF)
Satisfactory results obtained from sensor networks and the ongoing development in electronics and wireless communications have led to an impressive boost in the number of applications based on WSNs. Along with the growth in popularity of WSNs, previously implemented solutions need further improvements and new challenges arise which need to be solved. One of the main concerns regarding WSNs is the existence of security threats against their routing operations. Likelihood of security attacks in a structure suffering from resource constraints makes it an important task to choose proper security mechanisms for the routing decisions in various types of WSN applications. The main purpose of this study is to survey WSNs, routing protocols, security attacks against routing layer of a WSN, introduction of Trust based models which are an effective defense mechanism against security attacks in WSNs and finally, to implement a proposed Trust based routing protocol in order to overcome security attacks. The study begins with a survey of Sensor Networks, after the introduction of WSNs and their related routing protocols, the issue of security attacks against the network layer of a Sensor Network is described with a presentation of different types of attacks and some of Trust based related works. In the final chapters of this research, a novel Trust based AODV protocol will be proposed, implemented and examined in a simulation environment. For this purpose, multiple number of scenarios will be simulated on the AODV protocol with and without Trust mechanism, then the achieved results will be compared to derive a conclusion.
6

The home front : civil rights, American values, and public trust when America is at war /

Manor, Mike. January 2008 (has links)
Thesis (M.S.)--School of Advanced Air and Space Studies, 2008. / "June 2008." Title from cover. Vita. Includes bibliographical references (p. 60-62). Also available via the Internet.
7

Die Fiducie-Sûreté : eine Untersuchung der französischen Sicherungstreuhand aus deutscher Sicht / Fiducie-sûreté : une analyse de la fiducie-sûreté en France issue d'une vision allemande / Fiducie-sûreté : an analysis of the French security trust from a German perspective

Fix, Christian 22 January 2014 (has links)
La thèse qui a été préparée dans le cadre d’une cotutelle est consacrée à la fiducie-sûreté au sens des articles 2011 et s. du Code civil. Elle est rédigée en langue allemande et comporte un résumé en français. La thèse présente le sujet d’un point de vue comparatif. Après un bref aperçu introductif de la fiducie-sûreté, la thèse aborde les questions de la propriété fiduciaire et du patrimoine fiduciaire. Elle examine la question de savoir si la fiducie-sûreté se présente comme une sûreté accessoire à la créance garantie. Le dénouement de la fiducie-sûreté ainsi que les formalités de l’enregistrement et de publicité qui doivent être respectées font l’objet des développements dans les chapitres suivants. Les effets d’une procédure collective sur la fiducie-sûreté sont examinés de manière détaillée. La thèse conclut avec un résumé des résultats les plus importants soulignant les forces et les faiblesses majeures de la fiducie-sûreté. / The present thesis is dedicated to the fiducie-sûreté – the security trust in terms of articles 2011 et seqq. of the French Civil Code. The study is written in German and comprises an abstract in French. The author discusses the fiducie-sûreté from a comparative perspective. After providing a short overview of the fiducie-sûreté, the study deals with the questions related to the propriété fiduciaire and the patrimoine fiduciaire. It examines whether the fiducie-sûreté is accessory to the claim secured by this security right. In the following chapters, the work sheds light on the phase of termination of the fiducie-sûreté as well as on the measures of registration and publication which have to be observed. The work then explores the impact of insolvency proceedings on the fiducie-sûreté in its different aspects. The study concludes with a summary of its most important results underlining the strengths and weaknesses of the fiducie-sûreté.
8

INFRASTRUCTURE AND PRIMITIVES FOR HARDWARE SECURITY IN INTEGRATED CIRCUITS

Basak, Abhishek 31 May 2016 (has links)
No description available.

Page generated in 0.0341 seconds